Analysis
-
max time kernel
142s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 04:23
Static task
static1
General
-
Target
d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe
-
Size
1.2MB
-
MD5
3773489986d89e1c694a7b3e3f81f23e
-
SHA1
6af0a6bac3e5bac9f1f0d81c88d8e58743c31721
-
SHA256
d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71
-
SHA512
e1e0e74a01c473f05689fd512e96869663a11568fd466ad3ba09c4032b8aa9e87772b710512b1c7b2299fe81adda7d13e798c92787c2fa42b2395d27893a1575
-
SSDEEP
24576:TyAXMzomzsxlsbs0dJgo7ktnxcMFhBJY0CYm97ipSZJt9T07/Sq9GgRPcCjo:mAXMz3oggorMFhKpipSfXT8Sg1V
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr280158.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr280158.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr280158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr280158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr280158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr280158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr280158.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu574579.exesi526040.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation qu574579.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation si526040.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
Processes:
un441350.exeun200290.exepr280158.exequ574579.exe1.exerk621945.exesi526040.exeoneetx.exeoneetx.exeoneetx.exepid process 4360 un441350.exe 2808 un200290.exe 2260 pr280158.exe 544 qu574579.exe 3920 1.exe 3948 rk621945.exe 3592 si526040.exe 4756 oneetx.exe 3624 oneetx.exe 2104 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4244 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr280158.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr280158.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr280158.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un441350.exeun200290.exed8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un441350.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un441350.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un200290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un200290.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1196 2260 WerFault.exe pr280158.exe 3628 544 WerFault.exe qu574579.exe 4764 3592 WerFault.exe si526040.exe 3388 3592 WerFault.exe si526040.exe 2024 3592 WerFault.exe si526040.exe 3720 3592 WerFault.exe si526040.exe 4432 3592 WerFault.exe si526040.exe 3676 3592 WerFault.exe si526040.exe 4968 3592 WerFault.exe si526040.exe 1308 3592 WerFault.exe si526040.exe 1616 3592 WerFault.exe si526040.exe 4204 3592 WerFault.exe si526040.exe 4220 4756 WerFault.exe oneetx.exe 848 4756 WerFault.exe oneetx.exe 3264 4756 WerFault.exe oneetx.exe 1664 4756 WerFault.exe oneetx.exe 3532 4756 WerFault.exe oneetx.exe 1988 4756 WerFault.exe oneetx.exe 3788 4756 WerFault.exe oneetx.exe 2836 4756 WerFault.exe oneetx.exe 2976 4756 WerFault.exe oneetx.exe 1788 4756 WerFault.exe oneetx.exe 5052 4756 WerFault.exe oneetx.exe 4280 4756 WerFault.exe oneetx.exe 2396 3624 WerFault.exe oneetx.exe 1928 3624 WerFault.exe oneetx.exe 3868 3624 WerFault.exe oneetx.exe 2972 4756 WerFault.exe oneetx.exe 2260 4756 WerFault.exe oneetx.exe 4368 4756 WerFault.exe oneetx.exe 3900 4756 WerFault.exe oneetx.exe 1372 2104 WerFault.exe oneetx.exe 4988 2104 WerFault.exe oneetx.exe 2036 2104 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr280158.exerk621945.exe1.exepid process 2260 pr280158.exe 2260 pr280158.exe 3948 rk621945.exe 3920 1.exe 3948 rk621945.exe 3920 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr280158.exequ574579.exerk621945.exe1.exedescription pid process Token: SeDebugPrivilege 2260 pr280158.exe Token: SeDebugPrivilege 544 qu574579.exe Token: SeDebugPrivilege 3948 rk621945.exe Token: SeDebugPrivilege 3920 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si526040.exepid process 3592 si526040.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exeun441350.exeun200290.exequ574579.exesi526040.exeoneetx.exedescription pid process target process PID 1340 wrote to memory of 4360 1340 d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe un441350.exe PID 1340 wrote to memory of 4360 1340 d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe un441350.exe PID 1340 wrote to memory of 4360 1340 d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe un441350.exe PID 4360 wrote to memory of 2808 4360 un441350.exe un200290.exe PID 4360 wrote to memory of 2808 4360 un441350.exe un200290.exe PID 4360 wrote to memory of 2808 4360 un441350.exe un200290.exe PID 2808 wrote to memory of 2260 2808 un200290.exe pr280158.exe PID 2808 wrote to memory of 2260 2808 un200290.exe pr280158.exe PID 2808 wrote to memory of 2260 2808 un200290.exe pr280158.exe PID 2808 wrote to memory of 544 2808 un200290.exe qu574579.exe PID 2808 wrote to memory of 544 2808 un200290.exe qu574579.exe PID 2808 wrote to memory of 544 2808 un200290.exe qu574579.exe PID 544 wrote to memory of 3920 544 qu574579.exe 1.exe PID 544 wrote to memory of 3920 544 qu574579.exe 1.exe PID 544 wrote to memory of 3920 544 qu574579.exe 1.exe PID 4360 wrote to memory of 3948 4360 un441350.exe rk621945.exe PID 4360 wrote to memory of 3948 4360 un441350.exe rk621945.exe PID 4360 wrote to memory of 3948 4360 un441350.exe rk621945.exe PID 1340 wrote to memory of 3592 1340 d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe si526040.exe PID 1340 wrote to memory of 3592 1340 d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe si526040.exe PID 1340 wrote to memory of 3592 1340 d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe si526040.exe PID 3592 wrote to memory of 4756 3592 si526040.exe oneetx.exe PID 3592 wrote to memory of 4756 3592 si526040.exe oneetx.exe PID 3592 wrote to memory of 4756 3592 si526040.exe oneetx.exe PID 4756 wrote to memory of 2128 4756 oneetx.exe schtasks.exe PID 4756 wrote to memory of 2128 4756 oneetx.exe schtasks.exe PID 4756 wrote to memory of 2128 4756 oneetx.exe schtasks.exe PID 4756 wrote to memory of 4244 4756 oneetx.exe rundll32.exe PID 4756 wrote to memory of 4244 4756 oneetx.exe rundll32.exe PID 4756 wrote to memory of 4244 4756 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe"C:\Users\Admin\AppData\Local\Temp\d8554b24775c80db4949faf4be0ce624888feece58b14299834c5997baa55b71.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441350.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un200290.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un200290.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr280158.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr280158.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 10845⤵
- Program crash
PID:1196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu574579.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu574579.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 13805⤵
- Program crash
PID:3628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk621945.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk621945.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si526040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si526040.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 7003⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 7843⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 8603⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 9763⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 10123⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 9523⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 12203⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 12323⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 12243⤵
- Program crash
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 6964⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 8484⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 8964⤵
- Program crash
PID:3264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 10524⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 10964⤵
- Program crash
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 10844⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 10804⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 9964⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 9164⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 6964⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 13404⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 14604⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 11284⤵
- Program crash
PID:2972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 14644⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 14604⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 10924⤵
- Program crash
PID:3900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 13683⤵
- Program crash
PID:4204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2260 -ip 22601⤵PID:1016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 544 -ip 5441⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3592 -ip 35921⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3592 -ip 35921⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3592 -ip 35921⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3592 -ip 35921⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3592 -ip 35921⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3592 -ip 35921⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3592 -ip 35921⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3592 -ip 35921⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3592 -ip 35921⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3592 -ip 35921⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4756 -ip 47561⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4756 -ip 47561⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4756 -ip 47561⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4756 -ip 47561⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4756 -ip 47561⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4756 -ip 47561⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4756 -ip 47561⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4756 -ip 47561⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4756 -ip 47561⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4756 -ip 47561⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4756 -ip 47561⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4756 -ip 47561⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 3962⤵
- Program crash
PID:2396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 4402⤵
- Program crash
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 4402⤵
- Program crash
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3624 -ip 36241⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3624 -ip 36241⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3624 -ip 36241⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4756 -ip 47561⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4756 -ip 47561⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4756 -ip 47561⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4756 -ip 47561⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 3962⤵
- Program crash
PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 4402⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 4402⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2104 -ip 21041⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2104 -ip 21041⤵PID:816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2104 -ip 21041⤵PID:3404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
863KB
MD51dff1427a4096c29942f2c8c8afc2ab0
SHA16393f93a5eea1239cd7aa2e427b77c4afccccef0
SHA256888a6473c23a38ec4566ce6bf75a132b7cc9fcb8e948ee0024452dccfee05dbb
SHA512d1baea652cd6ea5a60f9868f6ff3a985c49248cdcaadcd9af1269db7b9e7d20d4fcf38cf84d42368ad1ad45604d6e487c110f2413c002f46b708bf71c9f1fbf0
-
Filesize
863KB
MD51dff1427a4096c29942f2c8c8afc2ab0
SHA16393f93a5eea1239cd7aa2e427b77c4afccccef0
SHA256888a6473c23a38ec4566ce6bf75a132b7cc9fcb8e948ee0024452dccfee05dbb
SHA512d1baea652cd6ea5a60f9868f6ff3a985c49248cdcaadcd9af1269db7b9e7d20d4fcf38cf84d42368ad1ad45604d6e487c110f2413c002f46b708bf71c9f1fbf0
-
Filesize
169KB
MD56028acd933a2e7ef8e279ffb1d880fcb
SHA16d99fa1e9b1e8d764994ee877ba28da24341ac5e
SHA256b89a5e3902ba2bbc7d4b8fb1aa0d7fc42b8e43f9a5215bebcc93072e1828cc32
SHA512be3fd5d01f03a863b8136a5afbecda213995aee0207c54e01b2e4e2dc042688dcf79cb52ed3a063062122d2d87babe1c633d1fdf4ecf4062882360eb1713e205
-
Filesize
169KB
MD56028acd933a2e7ef8e279ffb1d880fcb
SHA16d99fa1e9b1e8d764994ee877ba28da24341ac5e
SHA256b89a5e3902ba2bbc7d4b8fb1aa0d7fc42b8e43f9a5215bebcc93072e1828cc32
SHA512be3fd5d01f03a863b8136a5afbecda213995aee0207c54e01b2e4e2dc042688dcf79cb52ed3a063062122d2d87babe1c633d1fdf4ecf4062882360eb1713e205
-
Filesize
709KB
MD5997d37b9d09f973685f38266f251ce48
SHA11f9aea750072b514a05d93b82b182e297b38d5d1
SHA2560770c633badf85ae01af5a490e5d318c9e44db5cbbf2040d2d230af24639e57e
SHA5129e07cad37ac8d726f4a9473de425f84228a054f9ab59092ff62742fd5f62b0ece4c5975e3ade0aada0e44dc433146ae44d8502b16e7549e8dcfc3475fbf501bf
-
Filesize
709KB
MD5997d37b9d09f973685f38266f251ce48
SHA11f9aea750072b514a05d93b82b182e297b38d5d1
SHA2560770c633badf85ae01af5a490e5d318c9e44db5cbbf2040d2d230af24639e57e
SHA5129e07cad37ac8d726f4a9473de425f84228a054f9ab59092ff62742fd5f62b0ece4c5975e3ade0aada0e44dc433146ae44d8502b16e7549e8dcfc3475fbf501bf
-
Filesize
405KB
MD51bc7a2d7ef4fb548d438003822fd70a8
SHA100f8f6f606a5b458935b40947b2cf78115366a28
SHA256dce3ca6ef3c57f8331d60de32ad9580c66d44a3b85cbc6f8c3965a549ebd7b40
SHA512bc27db99f42903f2f9c237a935fabc705430950e95dd56d41c93f14d26d0bcbd0e7a41cc667c35aa81d42d347193d39bcd960040cedb1f78fdf3351e807c25e4
-
Filesize
405KB
MD51bc7a2d7ef4fb548d438003822fd70a8
SHA100f8f6f606a5b458935b40947b2cf78115366a28
SHA256dce3ca6ef3c57f8331d60de32ad9580c66d44a3b85cbc6f8c3965a549ebd7b40
SHA512bc27db99f42903f2f9c237a935fabc705430950e95dd56d41c93f14d26d0bcbd0e7a41cc667c35aa81d42d347193d39bcd960040cedb1f78fdf3351e807c25e4
-
Filesize
588KB
MD53f8c994f4565d9e6ba2c8c94018b2ce4
SHA12fab11e602c740ded3a0df4c77d26a7440d40012
SHA25689957c34fe062e72ac7052ba830d12d54e2805d6ec992ec61084f1be223c72a0
SHA5126bd3d9e95ed74d51f69ba0696da744e5d2ac703f00154f8c33202806dbc1d2be76b49daf60fddac7accdea655463925668685ddbabb60891ec08cefad5a296b7
-
Filesize
588KB
MD53f8c994f4565d9e6ba2c8c94018b2ce4
SHA12fab11e602c740ded3a0df4c77d26a7440d40012
SHA25689957c34fe062e72ac7052ba830d12d54e2805d6ec992ec61084f1be223c72a0
SHA5126bd3d9e95ed74d51f69ba0696da744e5d2ac703f00154f8c33202806dbc1d2be76b49daf60fddac7accdea655463925668685ddbabb60891ec08cefad5a296b7
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1